Behavioral task
behavioral1
Sample
296-71-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
296-71-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
296-71-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
066c58471aea427e1d6695146efead88
-
SHA1
c4807a138c171209d74b86044fa7fd89abbf8fab
-
SHA256
8ebf3ed96f79bc22aa23f27f08098b61711bf56ed79134b0f9ec622341269c44
-
SHA512
41a33523a96600d1c4dd9581335bf364d365e15a529416718a7a63288775a5bc0ea6374d2894148881d8918768750dfdc62214f719344e4cf3a7668b22428792
-
SSDEEP
1536:z8PWMO7momGcGYkkj9O8QQHFdCxlTk/sbbXAlv7uTT39VclN:z0o49O8QQHFPsbbX4v7APY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.0
Default
179.43.142.197:5789
ncarwpqkcbklyda
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
296-71-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ